St. John College of Buug Foundation Intelligence: National Highway, Buug, Zamboanga Sibugay

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

ST. JOHN COLLEGE OF BUUG FOUNDATION 5.

Remuneration – a person informs the police for some


pecuniary or other material gain he is to receive.
National Highway, Buug , Zamboanga Sibugay
6. Repentance – the informant provides as a sign of regret for
what he has previously done.
INTELLIGENCE 7. Revenge – vengeance or retaliation is the sole purpose of
the person in providing information to the police.
MODULE 6 8. Vanity – the person wants to gain favorable attention and
_________________________________________ importance from the police.
Objectives:
Legal Limitations in Obtaining Information
At the end of the lesson, the student will be to:
 Enumerate the scope of intelligence.
The power given by the state to police officers in gathering information
 Understand the function of intelligence in criminal is so huge that it may be prone to abuse. To protect the privacy of an
investigation. individual citizen, the law prohibits certain police actions such as the
__________________________________________________ following:
INFORMATION
1. Republic Act 4200(Anti- Wiretapping). Under the law the following
acts are prohibited:
Information – is defined as accusation in writing, charging a person
with an offense, subscribed by the fiscal and field of court. a. Tapping any wire or cable
b. Using any other device or arrangement
Intelligence - refers to collated, analyzed, and evaluate information c. To secretly overhear, intercept, or record
appropriately acquired for a particular purpose. d. Private communication/conversation or spoken word or
e. Without the knowledge or consent of all the parties.
Sources of Information

Sources of information is the network of date which can be linked or . Republic Act 10173(Data Privacy Act). Under this law, the following
grouped in order to obtain a concrete and reliable information based on acts are prohibited:
the prevailing need or as the need arises. Some of these common a. Unauthorized processing of personal information
sources are: b. Accessing personal information due to negligence
c. Improper disposal of personal information.
1. People as source of information d. Processing of personal information for unauthorized
a. Regular source – these are information gathered through purposes
people who have come directly to the attention of the police e. Unauthorized access or intentional breach
commonly the complainant, witness or victim. f. Malicious disclosure
b. Cultivated source – these are information generally taken g. Unauthorized disclosure.
through the use of informant or informer.
c. Grapevine source – these sources of information are
THE CHARACTERISTIC AND CONTEXT OF INTELLIGENCE
gathered from those who are in the underworld criminals or
ex- convicts.
2. Record as source of information Overt investigation - simply means as operation conducted openly.
a. Government source – these are sources taken from
government agencies or any of its instrumentality. Covert investigation - is an operation conducted in clandestine manner.
b. Private source – these sources of information are usually
taken from different private entities and business Clandestine simply means as secret.
organizations, public utilities such as water or electric bills,
and all private sectors. Considering that intelligence is the backbone of police operation, then
c. Internet source – this modern source of information is done no operation should be made without successful and accurate
through searching specific detail by typing the desired key or intelligence.
phase in the different search engine.
It must be noted that intelligence is not only used in line with the
different police operation but also in improving the political, economic,
Types and Motives of Informant and sociological advantage of the nation. Apart from that, take note,
that intelligence should possess the following characteristic as it serves
Informant - refers to any person who possess knowledge regarding its purpose. If not, any formation gathered will be hampered or might
crime, criminal syndicate, or going criminal activity and provides acquire false information. As whole, any operation or activity might be
information with the police with or without consideration. jeopardized.

Informer – refers most specially to those persons who are recruited 1.Intelligence and operation are interdependent.
basis just to provide information.
Intelligence provides valuable inputs for the effectiveness of police
Below are the common types of informants: operation, in like manner, operation provides for the continuity of
1. Anonymous – these are unidentified or known informants intelligence activities.
and usually provide information to the police through
telephone or cellphone. 2.Intelligence is continuous.
2. Double – crosser – these are those informants who provide
information in order also to gain information from the police. This implies that intelligence must not be disrupted and must be
Worst, they acquire more information than what they give. continuous following simple cycle from the time information is being
3. False Informant – these are those informants who provide collected in response to the need, up to the time will be processed and
false information or information without bases. disseminated to appropriate person.
4. Frightened Informants – an informant who provides
information due to panic or anxiety. 3.Intelligence must be useful
5. Legitimate – these are those informants who provide
information voluntarily to the police. This means that intelligence must meet the commander’s need and
6. Mercenary – these are those informants who provide should be relevant to the current operation.
information in exchange for a reward whether for money or
any other consideration. 4.Intelligence must available on time.
7. Self – aggrandizing – informant provide exaggerated
information to the police in order to gain advantage or Intelligence must be communicated and disseminated to appropriate
attention. person on time as information that is too advance or late as useless.
8. Women – these are the most dangerous and difficult type of
informants against male subjects. 5.Intelligence operations require imagination and foresight
In addition, below are the common motives of the informant in
providing information such as: Intelligence must be forecasted based on procedure with the intuition
1. Civic – mindedness – informant provides information as a that information is possible to be collected from a particular source.
sense of study and obligation to assist the police.
2. Fear – the person gives information due to oppression by 6.Inteligence must be flexible
enemies or other impending danger.
3. Gratitude or gain – information provides information to obtain It must be noted that intelligence is adaptable to every of all kinds as
a privilege toward the welfare of his family. operation might vary depending on the purpose and occasion.
4. Jealousy – the informant is published to provide information
to the police due to his resentment to the accomplishment or 7.Intelligence require continuous security measures
possessions of another.

St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
Take note to deny unauthorized disclosure or relevant information to Country Imagery Intelligence are actions such as surveillance radar,
enemy as well as provide protection in handling classified materials. photo thermal and infrared systems and rely heavily on pattern and
movement analysis and evaluation of the enemy.
Scope of Intelligence
Counter Signal Intelligence which determines enemy SIGINT and
Intelligence also covers a wide range of areas in its related enemy weakness, capabilities and activities, assess friendly
application. It might be a network of information concerning national operations to identify pattern, profiles and develop, recommend and
policy and national security which is known as National Security. It analyze countermeasures.
could also be collected, analyzed, collated and evaluated information
concerning criminal investigation, criminal syndicate, organized crimes, Passive Counterintelligence Measures include protection of classified
and other police problems which are known as Police Intelligence. and sensitive information to the unauthorized individual through
secrecy, communication security, and other various safeguards.
Criminal Intelligence – refers to the knowledge essential to the
prevention of crimes and the investigation, arrest, and prosecution of Active Counterintelligence Measures are those measures that actively
criminal offenders. block the enemies’ effort to gain information or engage in espionage,
subversion, and sabotage.
Internal Security Intelligence – refers to the knowledge essential in the
maintenance of peace and order. The concept of counterintelligence does not only limit to the protection
Public Safety Intelligence – refers to the knowledge essential in of vital protection of vital information or to hide one’s identity from the
ensuring the protection of lives and properties. enemy but also includes detection, prevention, and neutralization of
enemy activities. Detection is about knowing the clandestine operation
Strategic Intelligence – is a type of intelligence that is long range in of the enemy. Prevention is about avoiding enemy attacks or infiltration
nature and requires a longer period of time before being materialized while neutralization is the suppression of enemy activities.
are fully available. It is usually descriptive in nature, accumulation of
physical description of personalities and modus operandi. It does not To sum up, counterintelligence is very significant to but not limited to
Have immediate operational value, but rather long range that may the following such as:
become relevant to future police operations.
1. Denying information to the enemy
Line Intelligence – is a type of intelligence that is immediate in nature 2. Reducing the risk of a command
and can be available or developed within a short period of time. It is 3. Protecting vital information and property
kind of intelligence required by the commander to provide for planning 4. Increasing security forces
and conduct tactical and administrative operation in counterinsurgency. 5. Decreasing the enemy’s ability to create plans against the
This includes knowledge of People, Weather, Enemy and Terrain organization.
which is the fundamental in planning and conducting tactical and
administrative operation in a counterinsurgency. INTELLIGENCE CYCLE

Weather – refers to the visibility cloudy, temperature, precipitation(rain) Intelligence Cycle - is defined as the process of obtaining information
or windy of the climate. which includes proper
proper procedure and sequence of steps starting from planning,
Enemy - as the term suggest, refers to the study of location, strength, collection, collation, and the dissemination of information to appropriate
disposition, tactical capability, and vulnerability of the enemy. persons.

Terrain – includes relief and drainage system, vegetation, surface Intelligence cycle is important as it provides the necessary details in
material, manmade features and some military aspects of terrain which attaining the mission. Mission is the purpose why intelligence should
cover and concealment, obstacle, critical key terrain features, be gathered and used for particular undertaking. This is considered as
observation and fields of fire, and avenues of approach. the heart of the intelligence.

COUNTERINTELLIGENCE Planning Phase

Counter intelligence – is a type of intelligence employed to protect the Planning is defined as the process of determining the extent and scope
interest and safeguard lives, property and important information of the needed preparation which includes the supervision of the
against possible entry or infiltration of enemy forces from being lost, collection of information and other requirements based on the standard
destroyed or stolen. In police parlance, this includes denying and priorities.
blinding enemy about police operation as well as giving the police
officer the opportunity to gather information without being detected. In planning for the collection of information, the following factors should
This is also the phase of intelligence covering the activity devoted in be considered such as:
destroying the effectiveness of hostile foreign activities and the 1. Sources of information
protection of information against the following: 2. Operations of the command
3. Methods in gathering information
1. Espionage – refers to the stealing of vital information either physical
or in electronic form. Sources of information pertains to the individual or group, association
2. Subversion – the recruitment of person who is working within an or entity which may possess possible information to which an individual
organization or employment of any person to an organization who will desires to be gathered.
work secretly in an attempt to undermine or overthrow its current
system Operations of command is the manner how the collecting agency and
3. Sabotage – refers to the stealing of properties of destruction of any even the agency upon which data will be gathered acts or works for a
material in order to hamper or cause delay in the preparation or regular particular purpose in order to determine the needed preparation or
working duties. security.

The application of counterintelligence is best appreciated in providing Characteristics of the enemy refers to the capabilities, power,
Military Security as it provides the commander the necessary influence, and connections of the enemy forces or upon any person to
measures to be taken to protect itself against espionage, enemy, whom the data to be collected shall be directed or used.
operation, sabotage subversion or surprise. Method of gathering of information simply refers to the different
approaches as how information shall be gathered or collected. This is
In Port Frontier and Travel Security, counterintelligence aids in will help intelligence officer to provide the necessary Essential
protecting the point of entry and departure in international borders or Elements of Information (EEI).These are information pertaining to the
boundaries. In the field of Civil Security, counterintelligence helps in target area which the commander feels he can arrive with an accurate
providing measures that affect nonmilitary nationals who are residing in decision.
an area either permanently or temporarily. One of the best application
also of counterintelligence is the Censorship, as this Censorship, as Collecting Agency – refers to any organization, entity, association or
this aids in controlling the movement of the different person particularly individual person that collects and gathers the needed information
those who are expected to destroy any government institutions or through an intelligence officer.
projects. In the conduct of Special Operations, counterintelligence also Target area refers to any individual, group, association or entity that
provides protection against counter subversion, sabotage, and subjected to for operation or intelligence gathering.
espionage.
Collection Phase
Counter Human Intelligence seeks to overcome enemy attempts to use
human sources to collect information or to conduct sabotage and Collection - refers to the information gathering done in compliance with
subversion. established procedure to avoid detection and penetrate successfully.

In collecting information, the following factors should be considered


such as:
St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
1. Who will collect the information; Artificial covers are done if the undercover agent is modifying his
2. What information will be collected; identity based on the current operation or as the case may require
3. Where are the places whereby information shall be collected; while the multiple cover involves the use of different cover that will fit to
4. When is the right time to gather the information; a given situation.
5. How this information shall be collected and
6. Why this information should be collected? Residential assignment involves the employment of undercovers
agents in an area where the subject lives. Social assignment on the
Any information gathered or collected to which the intelligence officer other hand is the employment of undercover agent in the hangout
finds less value or no value at all shall be recorded and, if possible, places or areas where the subject frequents for fun and entertainment.
preserved as it may be used for future endeavors. Work assignment is employed of undercover agents in areas where the
subjects works.
In selecting the collecting agent, the following factors should be
considered: Undercover operations is composed of the following elements namely:
1. the head – is the person who directs the organization
1. The placement or access to the information. conducting the undercover operation.
2. The capability to gather the information. 2. Target – pertains to any person, place or things against
3. The number of people who will gather the information and which the undercover operation is to be conducted.
4. The strength and security of the target area. 3. Agent – refers to a person who conducts the clandestine
activity.
Collation Phase
Elicitation - is a form of extracting information done through an
Collation - refers to the process involved in evaluation the accuracy interview with a person who might possess valuable information
and reliability of the information collected. Reliability means judging the concerning a person, event, organization or place without his
source of information while accuracy simply means the level of knowledge or suspicion.
truthfulness of the information collected.
Approach - pertains to the manner as to how you will start talking.
In collation stage, all collected information will undergo the following:
1. Recording – refers to the systematic sorting of all
Probe – refers to the manner how will you keep the person talk.
documented information and present them either in writing or
some other form of presentation so that they can be
Safe house – refers to a safe place where the investigator or his
analyzed and studied for future action.
informant will meet for briefing or debriefing purpose.
2. Analysis – the collated information is divided into different
components; and isolate those that are relevant to the
Courier – refers to the person who carries an information to another
mission or those that has intelligence value which includes
person.
looking into the source of information, truthfulness of the
information and who provides the information.
Drops – refers to a secure place where agents or informants give their
3. Evaluation – refers to the assessment of information done to
message to the other agents.
determine the reliability of the source and providing
judgement in line with accuracy to determine its truthfulness
1. Dead Drop – the agent merely leaves the message.
as well as its pertinence to the current situation.
2. Live Drop – the courier hand over the message directly to
4. Integration – is the combination of all those isolated
the agent.
information from various sources to produce a new
information necessary for the success of the mission.
Reminder to the following while conducting undercover operations:
5. Interpretation – is the process involved in providing meaning
1. Act naturally as possible
and significance of new information.
2. Do not overplay your part
6. Synthesis – provide conclusion based on the new
3. Do not indulge in any activity, which is not in conformity with
information generated in relation to the current situation.
the assumed identity. This means that if you play the part of
a fisherman then act like a fisherman and have a knowledge,
Dissemination Phase
altitude and skills of a fisherman.
4. Do not make nots unless they are to be mailed or passed
Dissemination - refers to the actions taken to transfer processed
immediately. Use code or cipher if possible
information to appropriate persons.
5. Do not use liquor or any intoxicants except if necessary and
limit the amount to avoid being drunk.
In line with dissemination, the intelligence can be disseminated in any
6. Limit your association with women.
of the following:

1. Fragmentary orders from top to bottom of the command SURVEILLANCE


2. Memorandum, circulars, special orders
3. Operations order, oral written Surveillance is defined as the clandestine or secret observation of
4. Conference – staff members persons, places or objects to acquire valuable information.
5. Other report and intelligence documents Subject refers to who or what is being observed which can be any
6. Personal Contact person, place, property, vehicle, group of people organization or object
as the target in conducting surveillance.
Who are the users of Intelligence? Surveillance plan simply refers to the outline or blue print as to how
surveillance should be conducted.
1. National Leaders; Convoy- it as associated of the subject to follow him to detect
2. Military Commanders; surveillance.
3. Advisors and Staff; Decoy - a person or object used by the subject in attempt to escape
4. Friendly Nations; the eyes of surveillant.
5. Head /Chairman of an Organization; and Target
6. Any person with authority or right over the intelligence. Area – refers to the area of operation of surveillance activities.

Types of Surveillance
UNDERCOVER OPERATIONS
1. Stationary Surveillance – this surveillance is otherwise known as
Undercover operation - is a form of investigative technique whereby an fixed, plant or stake out surveillance and commonly done in one
undercover agent usually investigators assume another identity in standard location. This is best useful when:
order to infiltrate the ranks of criminal syndicate. a. A stolen property is expected to be dropped
b. A crime is expected to happen.
Undercover agent should have their best cover and cover story. 2. Moving Surveillance – this surveillance is employed when the
Covers refers to the means as to how investigators will hide his original subject moves from one place to another. The person is commonly
identity while cover story is the biographical portrayal of the tailing or shadowing the subject. Tailing or shadowing simply means as
investigators as to what role he will depict toward criminal syndicate the act of following a person’s movement either through foot or with the
while collecting vital information. The person who provides support to use of an automobile. The subject of this surveillance is usually person.
the investigator is referred to as the cover support. Undercover Under this method of surveillance, this could be done in the following
operation is otherwise known as roping although most of the time it manner:
refers to the surveillance of certain activities or events. a. Rough tail or open tail – otherwise known as rough
shadowing, ana is commonly employed if the subject t knows
In police work, undercover operation is done in order to acquire about the presence of the surveillant. Rough tail can be used
necessary inputs from a particular person or place that might possess in the following scenario:
valuable information.  When the subject is a material witness of a crime;
It also assisted the investigation in apprehending law violators.

St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
 A fugitive who knows that he is under constant
surveillance.

b. Close tail or tight tail – this tailing is employed when it is


extremely important not to lose the subject and a constant
surveillance is needed. Close tail is very useful when:
 The subject will commit a crime
 There is need to know the subject’s exact habit
and
 Subject activities are necessary to another critical
operation.

c. Loose tail – refers to the tailing commonly employed if the


surveillant wants to remain uneducated. This tailing could be
used best when:
 Surveillant needs the general information about
the subject
 Surveillant needs to know the subject’s activities or
associates.

3.Aerial surveillance – this type of surveillance is done during using


helicopters or other devices. This is commonly employed in areas that
is not accessible to foot or surveillance vehicle.

4. Video surveillance – this refers to the use of video equipment and


other devices used to record visual activity of the subject.

5.Audio or electronic surveillance – refers to the employment of


bugging or wiretapping devices.
a. Bugging is the eavesdropping any communication
or conversation with the aid of any bug devices.
Bug is a form of electronic device place in an
establishment to record, receive or transmit
conservation.
b. Wiretapping is the interception of communication
lines such as telephone or cellphone lines in order
to listen or record conversation.
Eavesdropping is the act of listening secretly to any conversation who
are within the same premise as with the person who intends to listen to
the conversation.

Examples of this
 Listening to people who are talking at the table beside you;
and
 Sitting beside the person who is talking to someone over
telephone lines.

Casing - refers to the process of inspecting places to determine its


suitability for operational use. In the military, it is known as
Reconnaissance. Sometimes, it is called the surveillance of places or
building. Casing could be done either:
1. Internal – it is the inspection of the different parts of the
building or any structure which includes but not limited to the
different rooms within the building.
2. External – this is the inspection and observation of the
immediate areas surrounding the building or any structure
which includes location, direction, possible exits, and others.

Methods of Surveillance

The manner as to how surveillance is to be conducted which


includes the various procedures and techniques employed by an agent
or surveillant is referred to as the methods in surveillance. This could
be either be one man shadow, two man shadow, or three man shadow.

AGENTS

Agents - is defined as any person capable, skilled and competent in


collecting, extracting, gathering, infiltrating, penetrating information of
all kinds in various sources as well as knowledgeable in the science of
disguise in order to avoid detection from the enemy or any unwanted
forces while doing intelligence work.
Intelligence work – is defined as the clandestine operation or activity
done by any agents in order to gather relevant facts for future
operation.

General Classification of Agents

1. Principal Agents – these are the leader or management


agent in the clandestine operation.
2. Action Agents – These are those who conducts the
clandestine operation which is further classified into:
St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
a. Espionage Agent – an agent responsible for the
collection of information;
b. Propagandist – these are agents who molds the
altitude, action or opinion of an individual group of
people;
c. Saboteur – an agent directed to undertake action
in line with destroying temporarily or permanently,
any material, an article or property which is
necessary in their normal operation;
d. Guerilla – these are agents who are part of
paramilitary group organized to cause great
damage to the enemy during hot war situation. Go over to face book messenger, google classroom,
e. Strong Arm – these are those agents who provide google meet for the online class, instructions and
special protection in times of dangerous phase of submission of activities given by the instructor.
clandestine operation Class code: [fgobmp3]
f. Provocateur – these are agents who includes the
enemy to act on their own detriment or put them in
disadvantage.
3. Support Agents – These are those agents who engage in activities
in line with giving support to the clandestine operations. This includes:
a. Surveillant Investigator – these are those who continue to
observe any person or places that is connected to the
operation.
b. Procurer of Funds – these are those who obtain money
needed to sustain the operation;
c. Safe house Keeper – is the person responsible in
maintaining the safe house for training, briefing, debriefing or
any other purposes.
d. Communication Agent – the person responsible for securing
the clandestine operation.

CRYPTOGARPHY

Cryptography – is defined as an art and science that deals with codes


and cipher.

Plain text – refers to the readable and understandable message that


will be converted into Cryptogram.

Cryptogram or unintelligible simply means as unreadable. Cryptogram


is the result of cryptography

Codes - is as system of words, numbers or symbols that are used to


represent a word.

Code book - is defined as a compilation of either word, number, or


symbol with their corresponding meaning.

Coded message - refers to the product or output of the code system.

Cipher – is the system which involves the substitution or transportation


of individual letters to make it unreadable. Cipher can be either
transportation cipher or substitution cipher

References: Fundamentals of Criminal Investigation and Intelligence


Negoso /Cano 2019)First Edition

1.

St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
c.
3. Aerial surveillance
a.
b.
c.
ST. JOHN COLLEGE OF BUUG FOUNDATION 4. Video surveillance
National Highway, Buug , Zamboanga Sibugay a.
b.
c.
COLLEGE OF CRIMINOLOGY 5. Audio or electronic surveillance
Writing to Learn Worksheet a.
Name: ____________________________________________ b.
Instructions: Answer the following questions. c.

Activity 1.
Activity 4.
Identification. Identify the following statements. Write your answer on
Based on the activity countdown, provide accurate judgement as to
the space provided.
the things that you need before, during and after the conduct of
surveillance.
_________1. What is that the element of investigation necessary for
gathering and collection of data to include its progress as it moves
1. What are the five things you need to remember before conducting
forward in solving the case.
surveillance?
_________2. It refers to any person who possess knowledge regarding
________________________________________________________
the crime, criminal syndicate or ongoing criminal activity and provides
________________________________________________________
information with the police with or without consideration.
________________________________________________________
_________3. An informant who informs the police for some pecuniary
________________________________________________________
or other material gain he is to receive.
________________________________________________________
_________4. These are those informants who provide information in
________________________________________________________
exchange for e reward whether for money or any other consideration.
________________________________________________________
_________5. A type of intelligence that is long range in nature and
________________________________________________________
requires a longer period of time before being materialized and fully
________________________________________________________
available.
________________________________________________________
_________6. A type of intelligence employed to protect the interest
2. Who are the four persons you while doing surveillance?
and safeguard lives, property and important information against
possible entry or infiltration of enemy forces from being lost, destroyed _____________________________________________
or stolen. ______________________________________________
_________7. How do you call that stealing of vital information either ________________________________________________________
physical or in electronic from? ________________________________________________________
_________8. This is the purpose why intelligence should be gathered ________________________________________________________
and used for particular undertaking and considered as the heart of the ________________________________________________________
intelligence cycle. ________________________________________________________
__________9. It refers to the assessment of information done to ________________________________________________________
determine the reliability of the source and providing judgment in line ________________________________________________________
with accuracy to determine its truthfulness as well as its pertinence to ________________________________________________________
the current situation. ________________________________________________________
_________10. A form of extracting information done through an
interview with the person who might possess valuable information 3. What are the tree areas you need to consider before doing
concerning a person, event, organization or place without his surveillance?
knowledge or suspicion. _____________________________________________
___________11. Define as the clandestine or secret observation of ______________________________________________
persons, places or objects to acquire valuable information.
________________________________________________________
_________12. Refers to the act of listening secretly to any
________________________________________________________
conversation who are within the same premise as with the person who
________________________________________________________
intends to listen to the conversation.
________________________________________________________
____________13. Refers to the process of inspecting places to
________________________________________________________
determine its suitability for operational use.
________________________________________________________
_________14. Defined as any person capable, skilled and competent
________________________________________________________
in collecting, extracting, gathering, infiltrating, penetrating information
________________________________________________________
of all kinds in various sources as well as knowledgeable in the science
________________________________________________________
of disguise in order to avoid detection from the enemy or any unwanted
forces while doing intelligence work.
4. What are the two things that you need to do after surveillance?
_________15. Defined as an art and science that deals with codes and
________________________________________________________
cipher.
________________________________________________________
________________________________________________________
Activity 2 ________________________________________________________
________________________________________________________
Do you think it good to use vehicle while doing surveillance ________________________________________________________
or shadowing a person? What do you think are its advantages? ________________________________________________________
Provide at least 5 advantages and disadvantages. ________________________________________________________
________________________________________________________
1. Advantage ________________________________________________________
________________________________________________________

5. What is the number one thing you need to put in mind while doing
2. Disadvantages surveillance?
________________________________________________________
________________________________________________________
Activity 3 ________________________________________________________
Aside from the examples above, what do you think are the ________________________________________________________
other scenarios or situation in which those types of surveillance are ________________________________________________________
best or party applicable? Provide at least two (3) examples. ________________________________________________________
1. Fixed surveillance ________________________________________________________
a. ________________________________________________________
b. ________________________________________________________
c. ________________________________________________________
________________________________________________________
2. Moving surveillance

a.
b.
St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021
St. John College Foundation of Buug Inc. Fundamentals of Criminal Investigation and Intelligence S.Y.2020-2021

You might also like